目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CWE-120 未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出) 类漏洞列表 1767

CWE-120 未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出) 类弱点 1767 条 CVE 漏洞汇总,含 AI 中文分析。

CWE-120 即经典缓冲区溢出,属于内存安全漏洞。当程序将输入数据复制到输出缓冲区时,若未验证输入大小是否超出目标容量,会导致内存越界写入。攻击者利用此缺陷可覆盖相邻内存数据,进而执行恶意代码或导致系统崩溃。开发者应严格校验输入长度,使用安全的边界检查函数,并确保目标缓冲区足够大,从而从根本上杜绝此类风险。

MITRE CWE 官方描述
CWE:CWE-120 未检查输入大小的缓冲区复制('Classic Buffer Overflow') 英文:产品将输入缓冲区复制到输出缓冲区,但未验证输入缓冲区的大小是否小于输出缓冲区的大小。
常见影响 (2)
Integrity, Confidentiality, AvailabilityModify Memory, Execute Unauthorized Code or Commands
Buffer overflows often can be used to execute arbitrary code, which is usually outside the scope of the product's implicit security policy. This can often be used to subvert any other security service.
AvailabilityModify Memory, DoS: Crash, Exit, or Restart, DoS: Resource Consumption (CPU)
Buffer overflows generally lead to crashes. Other attacks leading to lack of availability are possible, including putting the product into an infinite loop.
缓解措施 (5)
RequirementsUse a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. For example, many languages that perform their own memory management, such as Java and Perl, are not subject to buffer overflows. Other languages, such as Ada and C#, typically provide overflow protection, but the protection can be disabled by the programmer. Be wary that a lan…
Architecture and DesignUse a vetted library or framework that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid. Examples include the Safe C String Library (SafeStr) by Messier and Viega [REF-57], and the Strsafe.h library from Microsoft [REF-56]. These libraries provide safer versions of overflow-prone string-handling functions.
Operation, Build and CompilationUse automatic buffer overflow detection mechanisms that are offered by certain compilers or compiler extensions. Examples include: the Microsoft Visual Studio /GS flag, Fedora/Red Hat FORTIFY_SOURCE GCC flag, StackGuard, and ProPolice, which provide various mechanisms including canary-based detection and range/index checking. D3-SFCV (Stack Frame Canary Validation) from D3FEND [REF-1334] discusses…
Effectiveness: Defense in Depth
ImplementationConsider adhering to the following rules when allocating and managing an application's memory: Double check that your buffer is as large as you specify. When using functions that accept a number of bytes to copy, such as strncpy(), be aware that if the destination buffer size is equal to the source buffer size, it may not NULL-terminate the string. Check buffer boundaries if accessing the buffer i…
ImplementationAssume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does. When performing input validation, consider all potentially relevant properties, including length, type of input, the full range…
代码示例 (2)
The following code asks the user to enter their last name and then attempts to store the value entered in the last_name array.
char last_name[20]; printf ("Enter your last name: "); scanf ("%s", last_name);
Bad · C
The following code attempts to create a local copy of a buffer to perform some manipulations to the data.
void manipulate_string(char * string){ char buf[24]; strcpy(buf, string); ... }
Bad · C
CVE ID标题CVSS风险等级Published
CVE-2023-21664 Qualcomm Chipsets 缓冲区错误漏洞 — Snapdragon 7.8 High2023-09-05
CVE-2023-21662 Qualcomm Chipsets 安全漏洞 — Snapdragon 7.8 High2023-09-05
CVE-2023-40589 FreeRDP 安全漏洞 — FreeRDP 4.3 Medium2023-08-31
CVE-2023-4163 Brocade Fabric OS 安全漏洞 — Brocade Fabric OS 4.4 Medium2023-08-31
CVE-2023-24548 Arista EOS 安全漏洞 — EOS 5.3 Medium2023-08-29
CVE-2023-40166 Notepad++ 安全漏洞 — notepad-plus-plus 5.5 Medium2023-08-25
CVE-2023-40164 Notepad++ 安全漏洞 — notepad-plus-plus 5.5 Medium2023-08-25
CVE-2023-40036 Notepad++ 安全漏洞 — notepad-plus-plus 5.5 Medium2023-08-25
CVE-2023-40031 Notepad++ 安全漏洞 — notepad-plus-plus 7.8 High2023-08-25
CVE-2022-3742 Lenovo notebook 安全漏洞 — Notebook 6.7 Medium2023-08-23
CVE-2023-20168 Cisco NX-OS Software 输入验证错误漏洞 — Cisco NX-OS Software 7.1 High2023-08-23
CVE-2023-4041 Silicon Labs Gecko Bootloader 安全漏洞 — Gecko Bootloader 9.8 Critical2023-08-23
CVE-2023-39454 ELECOM WRC-X1800GS-B 安全漏洞 — WRC-X1800GS-B 9.8 -2023-08-18
CVE-2023-34419 Lenovo Notebook 安全漏洞 — Lenovo Notebook 6.7 Medium2023-08-17
CVE-2023-4029 Lenovo ThinkPad 安全漏洞 — ThinkPad 6.7 Medium2023-08-17
CVE-2023-4028 Lenovo Notebook 安全漏洞 — Lenovo Notebook 6.7 Medium2023-08-17
CVE-2023-39386 Huawei HarmonyOS 输入验证错误漏洞 — HarmonyOS 7.5 -2023-08-13
CVE-2023-39389 Huawei HarmonyOS 输入验证错误漏洞 — HarmonyOS 5.3 -2023-08-13
CVE-2023-39388 Huawei HarmonyOS 输入验证错误漏洞 — HarmonyOS 5.3 -2023-08-13
CVE-2023-4265 Zephyr 安全漏洞 — Zephyr 6.4 Medium2023-08-12
CVE-2023-28561 Qualcomm Chipsets 缓冲区错误漏洞 — Snapdragon 9.8 Critical2023-08-08
CVE-2023-21649 Qualcomm Chipsets 缓冲区错误漏洞 — Snapdragon 6.7 Medium2023-08-08
CVE-2023-3766 odoh-rs 安全漏洞 — odoh-rs 5.9 Medium2023-08-03
CVE-2023-3346 Mitsubishi Electric CNC Series 安全漏洞 — MITSUBISHI CNC M800V Series M800VW 9.8 Critical2023-08-03
CVE-2023-31430 Brocade Fabric OS 安全漏洞 — Brocade Fabric OS 5.5 Medium2023-08-01
CVE-2023-31431 Brocade Fabric OS 安全漏洞 — Fabric OS 5.5 Medium2023-08-01
CVE-2023-3494 FreeBSD 安全漏洞 — FreeBSD 8.8 -2023-08-01
CVE-2023-38671 PaddlePaddle 缓冲区错误漏洞 — PaddlePaddle 8.3 High2023-07-26
CVE-2022-41793 Babel 缓冲区错误漏洞 — Open Babel 9.8 Critical2023-07-21
CVE-2021-43072 Fortinet FortiManager 缓冲区错误漏洞 — FortiAnalyzer 6.3 Medium2023-07-18

CWE-120(未进行输入大小检查的缓冲区拷贝(传统缓冲区溢出)) 是常见的弱点类别,本平台收录该类弱点关联的 1767 条 CVE 漏洞。